skip to content
Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers Preview this item
ClosePreview this item
Checking...

Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers

Author: Pavel Gladyshev; Marcus K Rogers
Publisher: Berlin ; New York : Springer, ©2012.
Series: Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 88.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference papers and proceedings
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Pavel Gladyshev; Marcus K Rogers
ISBN: 9783642355158 3642355153
OCLC Number: 822978263
Description: 1 online resource (xi, 296 pages) : illustrations.
Contents: Cybercrime Investigations --
The Role of Perception in Age Estimation / Cynthia A. Murphy --
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers / Kathryn C. Seigfried-Spellar, Gary R. Bertoline, Marcus K. Rogers --
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media / Esti Peshin --
Mobile Device Forensics --
All Bot Net: A Need for Smartphone P2P Awareness / Kelly A. Cole, Ramindu L. Silva, Richard P. Mislan --
Results of Field Testing Mobile Phone Shielding Devices / Eric Katz, Richard Mislan, Marcus Rogers, Anthony Smith --
Windows Phone 7 from a Digital Forensics' Perspective / Thomas Schaefer, Hans Höfken, Marko Schuba --
An Agent Based Tool for Windows Mobile Forensics / S. Satheesh Kumar, Bibin Thomas, K.L. Thomas --
Forensic Extractions of Data from the Nokia N900 / Mark Lohrum. New Developments in Digital Forensics --
A Strategy for Testing Metadata Based Deleted File Recovery Tools / James R. Lyle --
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus / Neil C. Rowe, Simson L. Garfinkel --
A Novel Methodology for Malware Intrusion Attack Path Reconstruction / Ahmed F. Shosha, Joshua I. James, Pavel Gladyshev --
Performance Issues About Context-Triggered Piecewise Hashing / Frank Breitinger, Harald Baier --
Short Papers --
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment / Sean Thorpe, Indrakshi Ray, Indrajit Ray, Tyrone Grandison, Abbie Barbir, Robert France --
Yahoo! Messenger Forensics on Windows Vista and Windows 7 / Matthew Levendoski, Tejashree Datar, Marcus Rogers --
Robust Hashing for Efficient Forensic Analysis of Image Sets / Martin Steinebach. Tracking User Activity on Personal Computers / Anthony Keane, Stephen O'Shaughnessy --
Digital Forensics Techniques --
The Forensic Value of the Windows 7 Jump List / Alexander G. Barnett --
Finding Forensic Information on Creating a Folder in LogFile of NTFS / Gyu-Sang Cho, Marcus K. Rogers --
Rescuing Digital Data from Submerged HDD / Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida --
Digital Forensics Education --
Evaluating the Forensic Image Generator Generator / Christian Moch, Felix C. Freiling --
Internet and Network Investigations --
Forensic Extractions of Data from the Nokia N900 / Mark Lohrum --
Formal Methods of Digital Forensics --
A Forensic Framework for Incident Analysis Applied to the Insider Threat / Clive Blackwell --
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid / Serguei A. Mokhov, Joey Paquet, Mourad Debbabi.
Series Title: Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering, 88.
Other Titles: ICDF2C 2011
Responsibility: Pavel Gladyshev, Marcus K. Rogers (eds.).
More information:

Abstract:

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/822978263> # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "822978263" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/866537814#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_network_architectures> ; # Computer network architectures.
    schema:about <http://dewey.info/class/364.168/e23/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_science> ; # Computer science.
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/data_protection> ; # Data protection.
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Topic/computer_security> ; # Computer security
    schema:about <http://id.worldcat.org/fast/872065> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems.
    schema:about <http://id.loc.gov/authorities/subjects/sh85029493> ; # Computer crimes--Investigation
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_system_implementation> ; # Computer System Implementation.
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Thing/systems_and_data_security> ; # Systems and Data Security.
    schema:about <http://experiment.worldcat.org/entity/work/data/866537814#Topic/informatique> ; # Informatique
    schema:alternateName "ICDF2C 2011" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/866537814#Person/gladyshev_pavel> ; # Pavel Gladyshev
    schema:contributor <http://experiment.worldcat.org/entity/work/data/866537814#Person/rogers_marcus_k> ; # Marcus K. Rogers
    schema:copyrightYear "2012" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/866537814#Meeting/international_conference_on_digital_forensics_and_cyber_crime_3rd_2011_dublin_ireland> ; # International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)
    schema:datePublished "2012" ;
    schema:description "This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/866537814> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/1867-8211> ; # Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/866537814#Series/lecture_notes_of_the_institute_for_computer_sciences_social_informatics_and_telecommunications_engineering> ; # Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/866537814#CreativeWork/> ;
    schema:name "Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers"@en ;
    schema:productID "822978263" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/822978263#PublicationEvent/berlin_new_york_springer_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/866537814#Agent/springer> ; # Springer
    schema:url <http://dx.doi.org/10.1007/978-3-642-35515-8> ;
    schema:workExample <http://worldcat.org/isbn/9783642355158> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-35515-8> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/822978263> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Meeting/international_conference_on_digital_forensics_and_cyber_crime_3rd_2011_dublin_ireland> # International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/866537814#Place/dublin_ireland> ; # Dublin, Ireland)
    schema:name "International Conference on Digital Forensics and Cyber Crime (3rd : 2011 : Dublin, Ireland)" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Person/gladyshev_pavel> # Pavel Gladyshev
    a schema:Person ;
    schema:familyName "Gladyshev" ;
    schema:givenName "Pavel" ;
    schema:name "Pavel Gladyshev" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Person/rogers_marcus_k> # Marcus K. Rogers
    a schema:Person ;
    schema:familyName "Rogers" ;
    schema:givenName "Marcus K." ;
    schema:name "Marcus K. Rogers" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Place/dublin_ireland> # Dublin, Ireland)
    a schema:Place ;
    schema:name "Dublin, Ireland)" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Series/lecture_notes_of_the_institute_for_computer_sciences_social_informatics_and_telecommunications_engineering> # Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    schema:name "Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_network_architectures> # Computer network architectures.
    a schema:Thing ;
    schema:name "Computer network architectures." ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_science> # Computer science.
    a schema:Thing ;
    schema:name "Computer science." ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/computer_system_implementation> # Computer System Implementation.
    a schema:Thing ;
    schema:name "Computer System Implementation." ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/data_protection> # Data protection.
    a schema:Thing ;
    schema:name "Data protection." ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/management_of_computing_and_information_systems> # Management of Computing and Information Systems.
    a schema:Thing ;
    schema:name "Management of Computing and Information Systems." ;
    .

<http://experiment.worldcat.org/entity/work/data/866537814#Thing/systems_and_data_security> # Systems and Data Security.
    a schema:Thing ;
    schema:name "Systems and Data Security." ;
    .

<http://id.loc.gov/authorities/subjects/sh85029493> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872065> # Computer crimes--Investigation
    a schema:Intangible ;
    schema:name "Computer crimes--Investigation"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/entity/work/data/866537814#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    .

<http://worldcat.org/isbn/9783642355158>
    a schema:ProductModel ;
    schema:isbn "3642355153" ;
    schema:isbn "9783642355158" ;
    .

<http://worldcat.org/issn/1867-8211> # Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    schema:issn "1867-8211" ;
    schema:name "Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering," ;
    .

<http://www.worldcat.org/title/-/oclc/822978263>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/822978263> ; # Digital forensics and cyber crime : third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, revised selected papers
    schema:dateModified "2016-08-15" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.